Abstract

References (62)

Citations (9)

Using the URL or DOI link below will
ensure access to this page indefinitely

Based on your IP address, your paper is being delivered by:

New York, USA

Processing request.

Illinois, USA

Processing request.

Brussels, Belgium

Processing request.

Seoul, Korea

Processing request.

California, USA

Processing request.

If you have any problems downloading this paper,please click on another Download Location above, or view our FAQFile name: SSRN-id1656948. ; Size: 1921K

You will receive a perfect bound, 8.5 x 11 inch, black and white printed copy of this PDF document with a glossy color cover. Currently shipping to U.S. addresses only. Your order will ship within 3 business days. For more details, view our FAQ.

Quantity:Total Price = $9.99 plus shipping (U.S. Only)

If you have any problems with this purchase, please contact us for assistance by email: Support@SSRN.com or by phone: 877-SSRNHelp (877 777 6435) in the United States, or +1 585 442 8170 outside of the United States. We are open Monday through Friday between the hours of 8:30AM and 6:00PM, United States Eastern.

Due to network effects and switching costs in platform markets, entrants generally must offer revolutionary functionality. We explore a second entry path that does not rely upon Schumpeterian innovation: platform envelopment. Through envelopment, a provider in one platform market can enter another platform market, combining its own functionality with the target’s in a multi-platform bundle that leverages shared user relationships. We build upon the traditional view of bundling for economies of scope and price discrimination and extend this view to include the strategic management of a firm's user network. Envelopers capture share by foreclosing an incumbent’s access to users; in doing so, they harness the network effects that previously had protected the incumbent. We present a typology of envelopment attacks based on whether platform pairs are complements, weak substitutes or functionally unrelated, and we analyze conditions under which these attack types are likely to succeed.